
Raz-Lee Security Announces MFA support authentication by RSA, Duo, PingID, Google, Facebook etc.
Nanuet, New York – August 8, 2023 – Raz-Lee Security Inc announces a major software upgrade for iSecurity MFA, a
iSecurity Auditing and Response products help companies meet their IBM i auditing requirements by providing best-in-class monitoring and reporting solutions that secure their business-critical databases.
It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.
Real-time security events, via triggers to Email, SMS, Syslog, SNMP, and CL commands.
Real-time monitoring for QAUDJRN, User Activity and more. Schedule Reports and Security status.
Silent 5250 screen capture for end-to-end audit trails with Playback.
Changes to production automatically logged in IFS at object / source levels.
User Profiles, Native Objects and IFS. Plan, Check and Set parameters and authorities.
The iSecurity suite of products helps companies meet their IBM i security and regulatory requirements by providing best-in-class Exit Point Monitoring Integration, Anti-Virus protection of the IFS for malware as well as command line access security.
Detects and isolates the threat, and prevents it from damaging valuable data.
IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.
Gives to you the power to choose the Antivirus Database Provider.
Each module in our comprehensive security solutions for IBM i is designed to work independently or collectively to secure remote access, control user authorities and secure objects.
Effective Protection against any situation that could compromise security and reliability for IBM i.
Native Firewall Solution to control every Exit Point, besides control for Commands and Updating Files in Software Development Environments.
Regulates update files in production libraries. It provides a new security layer.
Control validity of System and User commands and their parameters, per user, IP, time, etc.
Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.
Analyzes and scores IBM i security definitions, suggests corrections and solutions.
Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.
Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.
Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.
Intuitive Graphical BI analysis of security data, supports “drill” to specific events.
Real-time DB activity including READ. Compares values by fields, Alerts and Reports.
Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.
SOX enabled File editor with UNDO capability and Log record of Changes.
Any organization that stores, processes or transmits cardholder data is required to comply with the PCI DSS standard.
Legislative audit requirements to protect investors by improving the accuracy and reliability of corporate disclosures
The General Data Protection Regulation reinforces and binds together information security for all people inside the European Union (EU).
A group of regulations that combat waste, fraud, and abuse in health care delivery and health insurance.
Our Development Team is always improving our produts.
iSecurity Suite is Native to IBM i so no additional structure is needed.
Partnerships with major global SIEM & DAM solution providers.
Users can choose to work on Green Screen or GUI (Windows).
Windows-based program for in-depth analysis of the full scope of the IBM i (AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of IBM i security, with full explanations.
Nanuet, New York – August 8, 2023 – Raz-Lee Security Inc announces a major software upgrade for iSecurity MFA, a
As it stands, the statistics relating to the effect ransomware is having on cloud services are sparse, to say the
Receive our latest blog posts directly in your inbox!